Skip to content

Commit a71127f

Browse files
Merge pull request #226017 from ssabat/master
Added blurb on Azure Key Vault
2 parents 505e770 + 1c7b793 commit a71127f

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/data-factory/data-movement-security-considerations.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: data-factory
77
ms.subservice: security
88
ms.topic: conceptual
99
ms.custom: seo-lt-2019
10-
ms.date: 08/05/2022
10+
ms.date: 02/01/2023
1111
---
1212

1313
# Security considerations for data movement in Azure Data Factory
@@ -56,6 +56,8 @@ In this article, we review security considerations in the following two data mov
5656

5757
- **Store encrypted credentials in an Azure Data Factory managed store**. Data Factory helps protect your data store credentials by encrypting them with certificates managed by Microsoft. These certificates are rotated every two years (which includes certificate renewal and the migration of credentials). For more information about Azure Storage security, see [Azure Storage security overview](../storage/blobs/security-recommendations.md).
5858
- **Store credentials in Azure Key Vault**. You can also store the data store's credential in [Azure Key Vault](https://azure.microsoft.com/services/key-vault/). Data Factory retrieves the credential during the execution of an activity. For more information, see [Store credential in Azure Key Vault](store-credentials-in-key-vault.md).
59+
-
60+
Centralizing storage of application secrets in Azure Key Vault allows you to control their distribution. Key Vault greatly reduces the chances that secrets may be accidentally leaked. Instead of storing the connection string in the app's code, you can store it securely in Key Vault. Your applications can securely access the information they need by using URIs. These URIs allow the applications to retrieve specific versions of a secret. There's no need to write custom code to protect any of the secret information stored in Key Vault.
5961

6062
### Data encryption in transit
6163
If the cloud data store supports HTTPS or TLS, all data transfers between data movement services in Data Factory and a cloud data store are via secure channel HTTPS or TLS.

0 commit comments

Comments
 (0)